-
Author Michele Orru , Christian Frichot , Wade Alcorn
Hackers exploit browser vulnerabilities to attack deep within networksThe Browser Hacker's Handbook gives a practical understanding of hacking the everyday web browser and using it as a beachhead to launch further attacks deep into corporate networks. Written by a ....
Release Date 2014/03 -
Microgrids: Architectures and Control
Author Nikos Hatziargyriou
Microgrids are the most innovative area in the electric power industry today. Future microgrids could exist as energy-balanced cells within existing power distribution grids or stand-alone power networks within small communities.A definitive presentation on all aspe....
Release Date 2014/03 -
Author Elaine Marmel
Let Sage Timeslips For Dummies show you how to turn your time into moneyIf you run a business that bills for its time, it's time you looked into Sage Timeslips and all it can do for you. This practical and friendly guide will help you get to know the Timeslips inte....
Release Date 2014/03 -
Measuring and Improving Social Impacts
Author Kristi Yuthas , Marc J. Epstein
The world is beset with enormous problems. And as a nonprofit, NGO, foundation, impact investor, or socially responsible company, your organization is on a mission to solve them. But what exactly should you do? And how will you know whether it’s working? Too many ....
Release Date 2014/03 -
Author Fernando Carbone
Written by a specialist in digital crime, this book helps you leverage the power of the FTX platform to conduct penetrating computer forensic investigations. With a step-by-step approach, it clarifies even the most complex processes.In DetailWith the increase of ele....
Release Date 2014/03 -
Unmasking the Social Engineer: The Human Element of Security
Author Paul Ekman , Paul Kelly F. , Christopher Hadnagy
Learn to identify the social engineer by non-verbal behaviorUnmasking the Social Engineer: The Human Element of Security focuses on combining the science of understanding non-verbal communications with the knowledge of how social engineers, scam artists and con men ....
Release Date 2014/02 -
Network Security Through Data Analysis
Author Michael S Collins
In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You’ll understand how your network is used, and what actions are necessary to protect and improve it. Divided i....
Release Date 2014/02 -
Author Zaid Hassan
Current responses to our most pressing societal challenges—from poverty to ethnic conflict to climate change—are not working. These problems are incredibly dynamic and complex, involving an ever-shifting array of factors, actors, and circumstances. They demand a hig....
Release Date 2014/02 -
IBM Worklight Mobile Application Development Essentials
Author Talha Haroon , Muhammad Saifuddin
Your move onto mobile devices is simplified when you use IBM Worklight and this user-friendly tutorial. After a guided tour through the components you’ll learn how to utilize them to optimize your mobile applications.In DetailIBM Worklight helps you extend your busi....
Release Date 2014/02 -
Governance of Enterprise IT based on COBIT®5
Author Geoff Harmer
Practical guidance on COBIT®5 implementation COBIT®5 (Control Objectives for Information and related Technology) is the latest release of the popular framework for the governance of enterprise IT. It links controls, technical issues and business risks, enabling mana....
Release Date 2014/02 -
Author Laurie-Ann O'Connor , Harold Shinitzky , Chris Cortman
Do you know what really triggers panic attacks? Are you aware of what thinking patterns create anxiety? Are you a chronic worrier? Have you ever self-medicated with alcohol or tranquilizers? According to mental health professionals, anxiety disorders have emerged as....
Release Date 2014/01 -
Author Crystal Kline , Rod Brouhard
Disaster preparedness is a topic that everyone should consider, not just people on the fringe. No matter where people live, the potential for a natural or manmade disaster exists, and every home should be stocked and ready for the worst. Disaster Preparedness ....
Release Date 2014/01 -
Learning Nessus for Penetration Testing
Author Himanshu Kumar
Master how to perform IT infrastructure security vulnerability assessments using Nessus with tips and insights from real-world challenges faced during vulnerability assessmentIn DetailIT security is a vast and exciting domain, with vulnerability assessment and penet....
Release Date 2014/01 -
Disaster Recovery and Business Continuity, 3rd Edition
Author Thejandra BS
What would you do if your systems were hacked or compromised by a virus? How would your IT systems cope in the event of flooding or an explosion?What if your IT systems simply stopped working?IT has brought many benefits to business. However, IT failures can seriou....
Release Date 2014/01 -
CSSLP Certification All-in-One Exam Guide
Author Daniel Shoemaker , Wm. Arthur Conklin
Get complete coverage of all the material included on the Certified Secure Software Lifecycle Professional exam. CSSLP All-in-One Exam Guide covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC2). Y....
Release Date 2013/12 -
Author Andrew Bindner , James Broad
Hacking with Kali introduces you the most current distribution of the de facto standard tool for Linux pen testing. Starting with use of the Kali live CD and progressing through installation on hard drives, thumb drives and SD cards, author James Broad walks you thr....
Release Date 2013/12 -
Network Basics Companion Guide
Author Cisco Networking Academy
Network Basics Companion Guide is the official supplemental textbook for the Network Basics course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.Using a top-down OSI model approach, the course introduces the architecture, structure, f....
Release Date 2013/12 -
Network Basics Companion Guide, Video Enhanced Edition
Author Cisco Networking Academy
Network Basics Companion Guide is the official supplemental textbook for the Network Basics course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum.Using a top-down OSI model approach, the course introduces the architecture, structure, functi....
Release Date 2013/12 -
Author David R. Miller
Your 2-in-1 Self-Paced Training KitEXAM PREP GUIDE Ace your preparation for Certified Information Systems Security Professional (CISSP) Exam. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce what you....
Release Date 2013/12 -
Back to the Land: Arthurdale, FDR's New Deal, and the Costs of Economic Planning
Author C. J. Maloney
How New Deal economic policies played out in the small town of Arthurdale, West VirginiaToday, the U.S. government is again moving to embrace New Deal-like economic policies. While much has been written about the New Deal from a macro perspective, little has been wr....
Release Date 2013/12 -
Work Smarts: What CEOs Say You Need To Know to Get Ahead
Author Betty Liu
Award-winning Bloomberg television host Betty Liu compiles the wisdom of the world's best CEOs into a fun, insightful, and practical guide for success.Betty Liu is famous the world over for asking the tough questions of today's most successful people—and for her u....
Release Date 2013/12 -
Author Anmol Misra , James Ransome
"... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats."—Dr. Dena Haritos Tsamiti....
Release Date 2013/12 -
Author Wanda Pina , Norma Davila
Managers are flooded with theories, concepts, and ideas for how to improve employee engagement—but what works, and what doesn’t? This book helps managers cut through the clutter of all those strategies and find the one that works for them. Beginning with the myths a....
Release Date 2013/12 -
Quicken 2014 The Official Guide, 2nd Edition
Author Bobbi Sandberg
The Only Official Guide to the #1 Personal Finance Software“Intuit-approved and loaded with secrets, this book provides you with recipes for financial success.” –Scott Cook, Co-Founder, Intuit, Inc.Organize your finances and assets with ease using the expert techniq....
Release Date 2013/11 -
Author Art Bowker , Todd G. Shipley
Written by experts on the frontlines, Investigating Internet Crimes provides seasoned and new investigators with the background and tools they need to investigate crime occurring in the online world. This invaluable guide provides step-by-step instructions for inves....
Release Date 2013/11 -
Identity and Access Management
Author Ertem Osmanoglu
Identity and Access Management: Business Performance Through Connected Intelligenceprovides you with a practical, in-depth walkthrough of how to plan, assess, design, and deploy IAM solutions. This book breaks down IAM into manageable components to ease systemwide i....
Release Date 2013/11 -
Applied Network Security Monitoring
Author Jason Smith , Chris Sanders
Applied Network Security Monitoring is the essential guide to becoming an NSM analyst from the ground up. This book takes a fundamental approach to NSM, complete with dozens of real-world examples that teach you the key concepts of NSM. Network security monitoring i....
Release Date 2013/11 -
Author Raymond Choo , Ben Martini , Darren Quick
To reduce the risk of digital forensic evidence being called into question in judicial proceedings, it is important to have a rigorous methodology and set of procedures for conducting digital forensic investigations and examinations. Digital forensic investigation i....
Release Date 2013/11 -
The Technical and Social History of Software Engineering
Author Capers Jones
“Capers Jones has accumulated the most comprehensive data on every aspect of software engineering, and has performed the most scientific analysis on this data. Now, Capers performs yet another invaluable service to our industry, by documenting, for the first time, i....
Release Date 2013/11 -
Author Robin Abernathy , Troy McMillan
This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book.Learn, prepare, and practice for CISSP exam success with the CISSP Cert Guide from Pearson IT Certification, a lea....
Release Date 2013/11